Articles

Partner Content
Your enterprise data may be just a search away: Secure it now

There are a whole host of reasons why organizations should consider encrypting their sensitive data: for protection, for legal reasons, to comply with global compliance policies and safeguard customer interests. 

Partner Content
7 Pro Tips for Vulnerability Management

Managing vulnerabilities in an organization's network is often an overwhelming job that's never done. But with the help of automation and with proper prioritization, security teams can stay on top of the task.

$660,000 data privacy fine highlights dangers for businesses dabbling in politics

A year into an investigation into the use of data analytics in political campaigns, the U.K.’s privacy watchdog is hitting companies that shared data with political parties with sanctions including a criminal prosecution and a US$660,000 fine.

China's data privacy law came into effect this May - and it was inspired by GDPR

This year China quietly released the final version of a new data privacy standard that goes even further than the European General Data Protection Regulation (GDPR) and places EU and Chinese data legislation on a far more level footing than American data law.

GDPR has arrived: Here's what will happen next

GDPR is finally here, but the story doesn't end at the implementation date.

‘EternalBlue’ continues to be a popular threat actor among cybercriminals: Seqrite

Over 18 Million hits of Ransomware and Cryptomining campaigns in 2017-2018. ‘EternalBlue’ is the deadliest exploit leaked by hacking group known as Shadow Brokers in April last year.

Businesses join to create enterprise standard for blockchain networks

Enterprise Ethereum Alliance, a group made up of 500 businesses, has published its first standard for a business-centric distributed ledger that promises to speed up transactions while increasing privacy.

Google details how it will overturn encryption signals in Chrome

Google has fleshed out its plans to upend the way browsers warn users of insecure websites, spelling out gradual steps the company will take with Chrome.

Partner Content
Spotted unusual activity on network: Here's what to do next

Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an enterprise network.

Partner Content
Here's the checklist of an efficient endpoint security solution

Most attacks on an organization can be traced back to devices connected to enterprise networks, which is basically an endpoint. And hence, that is why it is extremely important for an enterprise to ensure that their endpoints remain safe and secure.

Partner Content
Poor network visibility: Don't put your enterprise's security at risk

The number of devices that connect to enterprise networks is exponentially growing, leading to an inter-connected information highway. The size, complexity, and mobility of modern network environments are continuously increasing.

Partner Content
Key vulnerabilities in SMBs: Devices and people

On one hand, unlike the big business enterprises, SMBs may not always have the financial heft to really invest in cybersecurity solutions, which often leads to that taking a backseat.